Cisco Systems WSC2960X48TSL, WSC2960X24TDL, WSC2960X24PSL, WSC2960X24TSLL, C2960XSTACK Source VLANs

Page 85

Configuring SPAN and RSPAN

SPAN and RSPAN

Source ports can be in the same or different VLANs.

You can monitor multiple source ports in a single session.

Source VLANs

VLAN-based SPAN (VSPAN) is the monitoring of the network traffic in one or more VLANs. The SPAN or RSPAN source interface in VSPAN is a VLAN ID, and traffic is monitored on all the ports for that VLAN.

VSPAN has these characteristics:

All active ports in the source VLAN are included as source ports and can be monitored in either or both directions.

On a given port, only traffic on the monitored VLAN is sent to the destination port.

If a destination port belongs to a source VLAN, it is excluded from the source list and is not monitored.

If ports are added to or removed from the source VLANs, the traffic on the source VLAN received by those ports is added to or removed from the sources being monitored.

You cannot use filter VLANs in the same session with VLAN sources.

You can monitor only Ethernet VLANs.

VLAN Filtering

When you monitor a trunk port as a source port, by default, all VLANs active on the trunk are monitored. You can limit SPAN traffic monitoring on trunk source ports to specific VLANs by using VLAN filtering.

VLAN filtering applies only to trunk ports or to voice VLAN ports.

VLAN filtering applies only to port-based sessions and is not allowed in sessions with VLAN sources.

When a VLAN filter list is specified, only those VLANs in the list are monitored on trunk ports or on voice VLAN access ports.

SPAN traffic coming from other port types is not affected by VLAN filtering; that is, all VLANs are allowed on other ports.

VLAN filtering affects only traffic forwarded to the destination SPAN port and does not affect the switching of normal traffic.

Destination Port

Each local SPAN session or RSPAN destination session must have a destination port (also called a monitoring port) that receives a copy of traffic from the source ports or VLANs and sends the SPAN packets to the user, usually a network analyzer.

A destination port has these characteristics:

For a local SPAN session, the destination port must reside on the same switch or switch stack as the source port. For an RSPAN session, it is located on the switch containing the RSPAN destination session. There is no destination port on a switch or switch stack running only an RSPAN source session.

When a port is configured as a SPAN destination port, the configuration overwrites the original port configuration. When the SPAN destination configuration is removed, the port reverts to its previous

Catalyst 2960-X Switch Network Management Configuration Guide, Cisco IOS Release 15.0(2)EX

OL-29044-01

73

Image 85
Contents First Published July 10 Americas HeadquartersPage N T E N T S Configuring the Cisco Discovery Protocol Configuring Simple Network Management Protocol Rspan Vlan Vii Viii Convention Description Document ConventionsBold font Reader Alert Conventions Related Documentation Obtaining Documentation and Submitting a Service RequestXii Command Modes Information About Using the Command-Line InterfaceConfigure Mode Access Method Prompt Exit Method About This ModeQuit Ctrl-ZCommand or Action Purpose Step Using the Help SystemMode HelpNo and default Forms of Commands Understanding Abbreviated CommandsCLI Error Messages Configuration Logging How to Use the CLI to Configure FeaturesConfiguring the Command History Error Message MeaningRecalling Commands Changing the Command History Buffer SizeCommand or Action Disabling the Command History Feature Enabling and Disabling Editing FeaturesPrivileged Exec mode Terminal no historyEditing Commands through Keystrokes Editing Command Lines That Wrap Access-list Searching and Filtering Output of show and more CommandsShow more command begin include exclude regular-expression Show more command begin include excludeCommand or Action Example OL-29044-01 Prerequisites for Configuring the Configuration Engine Finding Feature InformationInformation About Configuring the Configuration Engine Restrictions for Configuring the Configuration EngineCisco Configuration Engine Software Related TopicsCisco Configuration Engine Architectural Overview Configuration ServiceCisco Networking Services IDs and Device Hostnames Event ServiceConfigID NameSpace MapperDeviceID Hostname, DeviceID, and ConfigIDHostname and DeviceID Cisco IOS CNS Agents Initial ConfigurationIncremental Partial Configuration Automated CNS ConfigurationSynchronized Configuration Device Required ConfigurationConfigure terminal How to Configure the Configuration EngineEnabling the CNS Event Agent EndReconnect-time time backup Configure terminal Enters the global configuration modeCns config partial hostname ip-address Cns config initial hostname ip-addressEnabling the Cisco IOS CNS Agent Command or Action Purpose Enabling an Initial Configuration for Cisco IOS CNS AgentOn the switch End Returns to privileged Exec modeExit Hostname name Configure terminal Cns template connect nameDiscover controller controller-typedlci Exit Returns to global configuration modeExit Hostname string string udi event image commandSource ip-address syntax-check Port-number event no-persistRefreshing DeviceIDs Show cns config connectionsShow cns event connections No cns event ip-address port-number Cns config partial ip-addresshostname Enabling a Partial Configuration for Cisco IOS CNS AgentCommand Purpose Monitoring CNS ConfigurationsTechnical Assistance Description Link Additional ReferencesRelease Modification Cisco IOS 15.02EXCDP Overview Information About CDPDefault CDP Configuration How to Configure CDPConfiguring CDP Characteristics FeatureOptional Configures CDP to send Version-2 advertisements No cdp run Disables CDP Configure terminal No cdp run EndDisabling CDP Cdp run Enables CDP if it has been disabled Configure terminal Cdp run EndEnabling CDP Enters interface configuration mode No cdp enable EndDisabling CDP on an Interface Specifies the interface on which you are disabling CDPEnabling CDP on an Interface Cdp enable EndCommand Description Cdp enable Enables CDP on a disabled interfaceMonitoring and Maintaining CDP Specifies the interface on which you are enabling CDPShow cdp neighbors interface-id CommandShow cdp traffic Related Documents Related Topic Document TitleFeature History and Information for Cisco Discovery Protocol Supported Snmp Versions Prerequisites for SnmpModel Level Authentication Encryption Result SHA Information About Snmp Restrictions for SnmpSnmp Overview Snmp Manager FunctionsSnmp Agent Functions Snmp MIB Variables AccessSnmp Community Strings Snmp ifIndex MIB Object Values Snmp NotificationsSnmp Configuration Guidelines Default Snmp ConfigurationFeature Default Setting Interface TypeConfigure terminal No snmp-server End How to Configure SnmpDisabling the Snmp Agent No snmp-server Disables the Snmp agent operation Configuring Community StringsSwitchconfig# access-list 4 deny any Snmp-server engineID local Configuring Snmp Groups and UsersIntegers twice the normal width V1 is the least secure of the possible security modelsSnmp-server user username End Example Configuring Snmp NotificationsNotification Type Keyword Description Snmp-server enable traps port-security trap-rate rate Snmp-server enable traps port-securityPort-security RtrSnmp-server user username group-nameremote V2c access access-list v3 encrypted accessRange is 1 to 1000 the default is Setting the Agent Contact and Location Information Snmp-server contact text Sets the system contact string Limiting Tftp Servers Used Through SnmpSnmp-server location text Sets the system location string Snmp-server tftp-server-list Monitoring Snmp StatusSnmp Examples Switchconfig# snmp-server enable traps entity Prerequisites for Span and Rspan Configuring Span and RspanRspan Restrictions for Span and RspanFlow-Based Span Fspan and Flow-Based Rspan Frspan Span and Rspan Information About Span and RspanLocal Span Remote Span Example of Local Span Configuration on a Single DeviceSpan and Rspan Concepts and Terminology Example of Rspan ConfigurationSpan Sessions Source Ports Source VLANs Rspan Vlan Span and Rspan Interaction with Other Features Span and Rspan and Device Stacks Flow-Based SpanConfiguration Guidelines Default Span and Rspan ConfigurationSpan Configuration Guidelines Rspan Configuration Guidelines How to Configure Span and RspanFspan and Frspan Configuration Guidelines Creating a Local Span SessionBoth rx tx Monitor session sessionnumber sourceEnd Local remote No monitor session sessionnumber allSpecifying VLANs to Filter Command or Action PurposeMonitor session sessionnumber filter vlan Configuring a Vlan as an Rspan VlanRemote-span Remote-span EndCreating an Rspan Source Session Destination remote vlan vlan-id Monitor session sessionnumberSwitchconfig# no monitor session Creating an Rspan Destination Session Remote vlan vlan-id Switchconfig# monitor session 2 source remote vlan Configure terminal Enters global configuration mode Configuring an Fspan SessionMonitor session sessionnumber source Configuring an Frspan Session Detailed Steps Monitoring Span and Rspan Operations Or Frspan configurationShow monitor Example Configuring Local Span Span and Rspan Configuration ExamplesExamples Creating an Rspan Vlan Feature History and Information for Span and RspanLimit IPv4, IPv6 or IPv4 + IPv6, or D E Span sessions
Related manuals
Manual 18 pages 20.28 Kb

WSC2960X24TSL, C2960XSTACK, WSC2960X24PDL, WSC2960X24TSLL, WSC2960X24PSL specifications

Cisco Systems has long been a leader in networking technology, and its range of switching products exemplifies its commitment to high performance and reliability. Among its popular offerings are the Catalyst 2960-X and 2960-XR series switches, including models like WSC2960X48TSL, WSC2960XR48FPDI, WSC2960XR24TDI, and WSC2960XR48LPDI. These switches are designed to deliver efficient Layer 2 and Layer 3 capabilities, making them ideal for enterprise and small to medium-sized business networks.

The WSC2960X48TSL model boasts 48 Ethernet ports, providing ample connectivity for various devices. It supports Power over Ethernet (PoE), making it suitable for powering IP cameras, wireless access points, and VoIP phones. The switch also features Cisco’s Smart Operations technology, which simplifies network management and enhances user experience through automated features such as Cisco Auto Smartports and Auto QoS.

Turning to the WSC2960XR48FPDI, this version also features 48 ports but with enhanced redundancy and power capabilities, making it suitable for critical applications where uptime is paramount. This switch offers dual power supply options, ensuring that even in the event of a power failure, network operations continue seamlessly. Its Flexible NetFlow feature enables enhanced visibility and monitoring of traffic, allowing businesses to optimize their bandwidth usage and troubleshoot issues more efficiently.

The WSC2960XR24TDI model, with its 24 ports, is perfectly designed for networks with fewer devices yet still demands robust performance. It also includes advanced security features, such as IEEE 802.1X port-based authentication, enhancing the protection of sensitive data and communications within the network.

Lastly, the WSC2960XR48LPDI model is tailored for environments that require high availability and robust performance, featuring 48 ports along with Layer 3 static routing capabilities. With its support for IPv6 and advanced QoS features, this switch is prepared for the future of networking, accommodating the increasing demand for bandwidth and reliable connectivity.

All these switches utilize Cisco IOS software, providing a familiar interface for network administrators. They also incorporate advanced troubleshooting tools, like Cisco Prime, which facilitate effective network management. Collectively, the WSC2960 series switches represent a comprehensive solution for businesses seeking dependable, scalable, and manageable networking options. With their combination of performance, features, and reliability, these Cisco switches are essential for meeting the demands of modern networking.